Shanghai improves data protection

Shanghai is raising the level of data protection in the city. A pilot program will classify and tiered data categories and develop catalogs of important data. To this end, the program will identify typical cases, develop general methods, and provide training to meet needs. The background is the Data Security Law (DSL), which includes classified… Continue reading Shanghai improves data protection

Compliance Requirements for Software Development Kits (SDK)

China continues to regulate the collection of private data in apps. For example, the importance of compliance with software development kits (SDKs) has increased significantly. Since June 2021, the authorities have been cracking down on the illegal use of SDKs in apps with SDK Security Special Actions. A software development kit is a collection of… Continue reading Compliance Requirements for Software Development Kits (SDK)

Establishment of Corporate IP Compliance

In the context of building a dual circulation system and creating a unified domestic market, China is guiding all enterprises to strengthen their compliance management to prevent business risks at home and abroad, promote modernization and transformation, and improve competitiveness. The compliance system is to cover areas such as market transactions, environment, human resources, finance,… Continue reading Establishment of Corporate IP Compliance

App Certification in China

There are various certifications in China for protecting personal data in apps. The most important is the App Security Certification of the China Cybersecurity Review Technology and Certification Center (CCRC). It applies to apps of all service types, for example, apps developed and used in the smart home sector. However, there is one important requirement… Continue reading App Certification in China

IP Compliance Guidelines

The Shanghai Pudong New Area Procuratorate has released China’s first intellectual property rights (IPR) compliance guidelines. The goal is to highlight IPR-related risks and drive the establishment of a robust IP compliance system. IP compliance includes patents, trademarks, copyrights, and trade secrets. The guidelines distinguish IPR risks according to their level. For example, changes in… Continue reading IP Compliance Guidelines

China’s Strict IT Compliance Competes with RCEP

The world’s largest free trade agreement, the Regional Comprehensive Economic Partnership (RCEP), has been in effect since Jan. 1, 2022. It allows companies in participating countries to engage in cross-border partnerships, tariff reductions and trade simplification. Over the next 20 years, up to 90% of tariffs incurred in the zone are expected to be eliminated.… Continue reading China’s Strict IT Compliance Competes with RCEP

Legal Requirements for Vulnerability Management

For some time now, CIOs around the world have been busy fixing the Log4j2 vulnerability. From a technical perspective, there are solutions such as patches and system upgrades. However, vulnerability management is not just a technical issue in China; there are also legal requirements that companies must meet.  For example, service providers are required by… Continue reading Legal Requirements for Vulnerability Management

Cyber Security and Data Protection: What’s in Store for 2022?

The year 2021 was – not only, but also – a turbulent year in the areas of cyber security and data protection in China. In addition to increased enforcement of the Multi-Level Protection Scheme (MLPS) in China, the implementation of which has been legally binding for companies in China since 2017 (see our webinars), many… Continue reading Cyber Security and Data Protection: What’s in Store for 2022?

Data Export Security Assessment: All Data Processors Are Involved

With the enactment of China’s Cybersecurity Law (CSL), Data Security Law (DSL), and Personal Information Protection Law (PIPL), security management and assessment of cross-border data transfer became a key issue. Following these three laws, China’s Cyberspace Administration (CAC) published the Measures on Data Export Security Assessment (Draft for Comments) on October 29, 2021, which provides… Continue reading Data Export Security Assessment: All Data Processors Are Involved

The PIPL Requires Data Mapping of Personal Information

With the new Personal Information Protection Law (PIPL), the assessment of the impact on data subjects through the Personal Information Security Impact Assessment (PISIA) becomes the center of attention. PISIA assesses the legal compliance of current personal data processing, identifies the risks to data subjects, and evaluates the effectiveness of the data protection measures taken.… Continue reading The PIPL Requires Data Mapping of Personal Information